Sciweavers

283 search results - page 19 / 57
» Software Inspections We Can Trust
Sort
View
65
Voted
SOFTVIS
2006
ACM
15 years 3 months ago
Visualization of areas of interest in software architecture diagrams
Understanding complex software systems requires getting insight in how system properties, such as performance, trust, reliability, or structural attributes, correspond to the syst...
Heorhiy Byelas, Alexandru Telea
INFSOF
2006
170views more  INFSOF 2006»
14 years 9 months ago
How large are software cost overruns? A review of the 1994 CHAOS report
: The Standish Group reported in 1994 that the average cost overrun of software projects was as high as 189%. This cost overrun number is used as input in recent governmental repor...
Magne Jørgensen, Kjetil Moløkken-&Os...
TRUST
2010
Springer
14 years 7 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
SIGSOFT
2006
ACM
15 years 3 months ago
Detecting increases in feature coupling using regression tests
Repeated changes to a software system can introduce small weaknesses such as unplanned dependencies between different parts of the system. While such problems usually go undetecte...
Olivier Giroux, Martin P. Robillard